Cloud computing: gaps in the “cloud” No. 336 - Bochum, 24.10.2011 Massive security flaws at Amazon Web Services discovered and remedied RUB researchers present hack at the ACM Cloud Computing Security Workshop in Chicago Researchers from Ruhr-University Bochum have found a massive security gap at Amazon Cloud Services. Using different methods of attack (signature wrapping and cross site scripting) they tested the system which was deemed “safe”. An Enterprise-Class Open Source Distributed Monitoring Solution Zabbix is the ultimate enterprise-level software designed for monitoring availability and performance of IT infrastructure components. Zabbix is open source and comes at no cost. With Zabbix it is possible to gather virtually limitless types of data from the network. High performance real-time monitoring means that tens of thousands of servers, virtual machines and network devices can be monitored simultaneously. Along with storing the data, visualization features are available (overviews, maps, graphs, screens, etc), as well as very flexible ways of analyzing the data for the purpose of alerting. Thresholds of acceptable limits for incoming data can be set.
Fighting Fraud: Stop Social Engineers in Their TracksWebinar. Despite all the media hype about hackers and viruses, the greatest threats to an organization's information security are the employees of the company. They're the ones who too often, too willingly, fall victim to Social Engineering ploys and open the doors wide to slick-tongued fraudsters. When an intruder targets an organization for attack, be it for theft, fraud, economic espionage, or any other reason, the first step is reconnaissance. They need to know their target. The easiest way to conduct this task is by gleaning information from those that know the company best.
The Facebook IPO – US Business News — Carly Fiorina: An Open Letter to Mark Zuckerberg Do not establish the precedent of providing quarterly earnings guidance. While you must of course protect competitively sensitive information, communicate as proactively and transparently as possible about your strategic goals and operational performance metrics as well as how you track your own progress and performance against both. 2) Whatever the ultimate valuation of Facebook, it will be one of the most sought after equities in the world. A lot of people are now counting on your performance. Aaron Swartz: husband of prosecutor criticises internet activist's family The husband of the US district attorney involved in the Aaron Swartz prosecution has publicly criticised the activist's family for accusing his wife of complicity in the suicide, amid claims the aggressive litigation was driven by their desire for a test case. Tom Dolan, an IBM executive married to Carmen Ortiz, used his Twitter account to attack the family of Swartz, who died on Friday. One tweet, posted on his @TomJDolan feed, said: "Truly incredible that in their own son's obit they blame others for his death and make no mention of the 6 month offer." His comments, made three days after Swartz's death, attracted outrage on social media. The account has since been deleted.
Pentagon asks hackers for help with cyber security J. Scott Applewhite/AP Former top counterterrorism adviser Richard Clarke is sworn in to testify to the federal panel reviewing the Sept. 11 attacks in 2004. WASHINGTON - The Pentagon agency that invented the Internet is asking the hacker community for help in eliminating Defense Department computer vulnerabilities.
U.S. Air Force May Buy 18,000 Apple IPad2s for Flight Crews (Updates with tablet market share in 10th paragraph and share prices in 11th paragraph.) Feb. 10 (Bloomberg) -- The U.S. Air Force may buy as many as 18,000 iPad2s in what would be one of the military’s biggest orders of computer tablets, accelerating Apple Inc.’s inroads into the federal government. The service’s Air Mobility Command plans to issue a request for proposals to buy between 63 and 18,000 “iPad 2, Brand Name or Equal devices” to lighten the load of flight crews, according to a notice posted on the Federal Business Opportunities website. The goal is to replace the bag of manuals and navigation charts weighing as much as 40 pounds that are carried by pilots and navigators, said Captain Kathleen Ferrero, a spokeswoman for the command. “The airline industry is way ahead of us on this,” she said in a telephone interview.
How much does cybercrime cost? The cost of protecting ourselves against cybercrime can far exceed the cost of the threat itself. This is the conclusion of a recent report ‘Measuring the cost of cybercrime’ by an international team of scientists led by the University of Cambridge. On the basis of the findings – which provide the first systematic estimate of the direct costs, indirect costs and defence costs of different types of cybercrime for the UK and the world – the authors conclude that we should spend less in anticipation of cybercrime and more on catching the perpetrators. “Advances in information technology are moving many social and economic interactions, such as fraud or forgery, from the physical worlds to cyberspace,” said lead author Ross Anderson, Professor of Security Engineering at the University of Cambridge’s Computer Laboratory. “As countries scramble to invest in security to minimise cyber-risks, governments want to know how large that investment should be and where the money should be spent.”